CN108777720A - Document transmission method and Related product - Google Patents

Document transmission method and Related product Download PDF

Info

Publication number
CN108777720A
CN108777720A CN201810730723.5A CN201810730723A CN108777720A CN 108777720 A CN108777720 A CN 108777720A CN 201810730723 A CN201810730723 A CN 201810730723A CN 108777720 A CN108777720 A CN 108777720A
Authority
CN
China
Prior art keywords
file
source terminal
data packet
encryption
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810730723.5A
Other languages
Chinese (zh)
Inventor
王成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou Berg Information Security Technology Co Ltd
Original Assignee
Huzhou Berg Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huzhou Berg Information Security Technology Co Ltd filed Critical Huzhou Berg Information Security Technology Co Ltd
Priority to CN201810730723.5A priority Critical patent/CN108777720A/en
Publication of CN108777720A publication Critical patent/CN108777720A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

A kind of document transmission method of disclosure offer and Related product, described method includes following steps:Source terminal obtains user's the first file to be transmitted;Source terminal encrypts first file using Encryption Algorithm to obtain the second file, and second file load is transmitted in the load of data packet.Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained the first file.Technical solution provided by the present application has the advantages that safe.

Description

Document transmission method and Related product
Technical field
The present invention relates to computer and software technology fields, and in particular to a kind of document transmission method and Related product.
Background technology
File transmission refers to file being relayed to another terminal from a terminal, for transmission during, according to source end Path between end and purpose terminal, it is possible that repeatedly forwarding, in current file transmission, generally directly transmitting Mode, i.e., by plaintext transmission, this transmission mode is low for the confidentiality of file, so the safety of its file transmission is low.
Invention content
An embodiment of the present invention provides a kind of document transmission method and Related products, can add to the file of transmission It is close, the transmission performance of file is improved in this way.
In a first aspect, the embodiment of the present invention provides a kind of document transmission method, described method includes following steps:
Source terminal obtains user's the first file to be transmitted;
Source terminal encrypts first file using Encryption Algorithm to obtain the second file, which is loaded in data It is transmitted in the load of packet.
Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained first File.
Second aspect provides a kind of document transmission system, the system:Source terminal and purpose terminal;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file, by second file for encrypting first file using Encryption Algorithm Load is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, by the second file decryption for receiving the data packet Obtain the first file.
The third aspect provides a kind of computer readable storage medium, and storage is used for the program of electronic data interchange, In, described program makes terminal execute the method that first aspect provides.
Implement the embodiment of the present invention, has the advantages that:
As can be seen that when through the embodiment of the present invention unidentified to car plate, such as when facing board, body is determined by face Part, the time is recorded, then realizes the charging to vehicle according to identity, user is not necessarily in this way and takes paper bill, there is user experience Spend high advantage.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of structural schematic diagram of terminal.
Fig. 2 is a kind of flow chart of asymmet-ric encryption method provided by the present application.
Fig. 3 is a kind of flow chart of asymmetric decryption method provided by the present application.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Term " first ", " second ", " third " in description and claims of this specification and the attached drawing and " Four " etc. be for distinguishing different objects, rather than for describing particular order.In addition, term " comprising " and " having " and it Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process of series of steps or unit, method, be The step of system, product or equipment are not limited to list or unit, but further include the steps that optionally not listing or list Member, or further include optionally for the intrinsic other steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, result or the characteristic that describe can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
In the method that first aspect provides,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
In the method that first aspect provides,
First file is encrypted to obtain the second file by the source terminal using Encryption Algorithm;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
In the method that first aspect provides,
The method further includes:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
In the system that second aspect provides,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
In the system that second aspect provides,
The source terminal obtains second specifically for source IP is executed encryption as the encryption secret key for encrypting first file File.
In the system that second aspect provides,
The source terminal, be specifically used for data packet increase verification flag, the verification flag be used to indicate this second The integrity degree of file.
Refering to fig. 1, Fig. 1 is a kind of mobile terminal structure schematic diagram, as shown in Figure 1, the mobile terminal may include intelligence Mobile phone (such as Android phone, iOS mobile phones, Windows Phone mobile phones), tablet computer, palm PC, laptop, Mobile internet device (MID, Mobile Internet Devices) or Wearable etc., above-mentioned mobile terminal are only to lift Example, and it is non exhaustive, it, for convenience of description, will be above-mentioned mobile whole in following example including but not limited to above-mentioned mobile terminal End is known as user equipment (User equipment, UE) or terminal.Certainly in practical applications, above-mentioned user equipment is also not necessarily limited to Above-mentioned realization form, such as can also include:Intelligent vehicle mounted terminal, computer equipment, smartwatch etc..As shown in Fig. 1, The terminal includes:Processor 101, input unit 102, communications module 103, memory 104 and camera 105.
Input unit 102 can be used for receiving the number or character information of input, and generate with the user setting of terminal with And the related key signals input of function control.Specifically, input unit 102 may include touching display screen, fingerprint identification device with And other input equipments.Fingerprint identification device can be separately provided, and certainly in practical applications, fingerprint identification device can also be tied It is bonded to touching display screen, that is, realizes the lower fingerprint of screen.Input unit can also include other input equipments.Specifically, other are inputted Equipment can include but is not limited to physical button, function key (such as volume control button, switch key etc.), trace ball, mouse, It is one or more in operating lever etc..
Processor 101 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 104, and call and be stored in memory 104 Data execute the various functions and processing data of terminal, to carry out integral monitoring or control to terminal.Optionally, processor 101 may include one or more processing units;Optionally, processor 101 can integrate application processor, modem processor and Artificial intelligence chip, wherein the main processing operation system of application processor, user interface and application program etc., modulatedemodulate is mediated Reason device mainly handles wireless communication, and artificial intelligence chip mainly realizes the calculating of neural network model.It is understood that above-mentioned Modem processor or artificial intelligence chip can not also be integrated into processor 101.
In addition, memory 104 may include high-speed random access memory, can also include nonvolatile memory, example Such as at least one disk memory, flush memory device or other volatile solid-state parts.
Communications module 103 can be used for sending and receiving for information.In general, communications module 103 includes but not limited to antenna, extremely Few an amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc.. In addition, communications module 103 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication, which can use, appoints One communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Camera 105 can be used for acquiring picture, scan the two-dimensional code etc. to image real time transfer.Camera 105 has Body may include front camera or rear camera, can also include dual camera for rear camera, certainly for preceding It may be dual camera setting to set camera, and the application does not limit the quantity and specific location of camera, camera The picture of 105 acquisitions can be transferred to processor 101 and carry out relevant processing.
Terminal may also include at least one sensor, such as optical sensor, motion sensor and other sensors.Specifically Ground, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to the bright of ambient light Secretly adjust the brightness of touching display screen, proximity sensor can close touching display screen and/or the back of the body when mobile phone is moved in one's ear Light.As a kind of motion sensor, accelerometer sensor can detect in all directions the size of (generally three axis) acceleration, Size and the direction that can detect that gravity when static can be used to identify application (such as horizontal/vertical screen switching, the related trip of mobile phone posture Play, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;The gyro that can also configure as terminal The other sensors such as instrument, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
WiFi belongs to short range wireless transmission technology, terminal can help user to send and receive e-mail by WiFi module, Browse webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.
Terminal further includes the power supply (such as battery) powered to all parts, and optionally, power supply can pass through power management System and processor 101 are logically contiguous, to realize management charging, electric discharge and power managed etc. by power-supply management system Function.
Referring to Fig.2, Fig. 2 provides a kind of document transmission method, this method can be executed with terminal, this method such as Fig. 2 institutes Show, includes the following steps:
Step S201, source terminal obtains user's the first file to be transmitted;
Step S202, source terminal encrypts first file using Encryption Algorithm to obtain the second file, by second file Load is transmitted in the load of data packet.
Step S203, purpose terminal receives the data packet, extracts the second file in the data packet, by the second file decryption Obtain the first file.
Technical solution provided by the present application carries encrypted file in data packet by after first file encryption Transmission in load belongs to clear data in this way for data packet, and such data will not be decrypted in forwarding, so i.e. Make for the second file corruption, then the second file will not divulge a secret, so its have the advantages that it is safe.
Optionally, above-mentioned Encryption Algorithm can specifically include:Rivest, shamir, adelman, symmetric encipherment algorithm etc., certainly Other Encryption Algorithm can also be used.
Optionally, which is encrypted to obtain the second file and be specifically as follows by above-mentioned source terminal using Encryption Algorithm;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
Optionally, the above method can also include:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
Refering to Fig. 3, Fig. 3 provides a kind of document transmission system, the system:Source terminal 301 and purpose terminal 302;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file, by second file for encrypting first file using Encryption Algorithm Load is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, by the second file decryption for receiving the data packet Obtain the first file.
The embodiment of the present invention also provides a kind of computer storage media, wherein computer storage media storage is for electricity The computer program that subdata exchanges, it is any as described in above method embodiment which so that computer is executed A kind of some or all of document transmission method step.
The embodiment of the present invention also provides a kind of computer program product, and the computer program product includes storing calculating The non-transient computer readable storage medium of machine program, the computer program are operable to that computer is made to execute such as above-mentioned side Some or all of any type document transmission method described in method embodiment step.
It should be noted that for each method embodiment above-mentioned, for simple description, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the described action sequence because According to the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to alternative embodiment, and involved action and module are not necessarily of the invention It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, for example, the unit division, it is only a kind of Division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, Can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of software program module.
If the integrated unit is realized in the form of software program module and sells or use as independent product When, it can be stored in a computer-readable access to memory.Based on this understanding, technical scheme of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory Various Jie that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD Matter.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer-readable memory, memory May include:Flash disk, read-only memory (English:Read-Only Memory, referred to as:ROM), random access device (English: Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present invention is described in detail above, specific case used herein to the principle of the present invention and Embodiment is expounded, and the explanation of above example is only intended to facilitate the understanding of the method and its core concept of the invention; Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, can in specific embodiments and applications There is change place, in conclusion the content of the present specification should not be construed as limiting the invention.

Claims (9)

1. a kind of document transmission method, which is characterized in that described method includes following steps:
Source terminal obtains user's the first file to be transmitted;
Source terminal encrypts first file using Encryption Algorithm to obtain the second file, which is loaded in data packet It is transmitted in load.
Purpose terminal receives the data packet, extracts the second file in the data packet, and the second file decryption is obtained the first file.
2. according to the method described in claim 1, it is characterized in that,
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
3. according to the method described in claim 1, it is characterized in that, the source terminal adds first file using Encryption Algorithm Close second file that obtains is specially;
Source IP is executed encryption as the encryption secret key for encrypting first file and obtains the second file by source terminal.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
Source terminal increases verification flag in data packet, which is used to indicate the integrity degree of second file.
5. a kind of document transmission system, which is characterized in that the system:Source terminal and purpose terminal;
The source terminal, for obtaining user's the first file to be transmitted;
The source terminal obtains the second file for encrypting first file using Encryption Algorithm, which is loaded It is transmitted in the load of data packet.
The purpose terminal extracts the second file in the data packet, the second file decryption is obtained for receiving the data packet First file.
6. system according to claim 5, which is characterized in that
The Encryption Algorithm specifically includes:Rivest, shamir, adelman, symmetric encipherment algorithm.
7. system according to claim 5, which is characterized in that
The source terminal obtains the second text specifically for source IP is executed encryption as the encryption secret key for encrypting first file Part.
8. system according to claim 5, which is characterized in that
The source terminal is specifically used for increasing verification flag in data packet, which is used to indicate second file Integrity degree.
9. a kind of computer readable storage medium, program of the storage for electronic data interchange, wherein described program makes end End executes the method provided such as claim 1-4 any one.
CN201810730723.5A 2018-07-05 2018-07-05 Document transmission method and Related product Pending CN108777720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810730723.5A CN108777720A (en) 2018-07-05 2018-07-05 Document transmission method and Related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810730723.5A CN108777720A (en) 2018-07-05 2018-07-05 Document transmission method and Related product

Publications (1)

Publication Number Publication Date
CN108777720A true CN108777720A (en) 2018-11-09

Family

ID=64031062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810730723.5A Pending CN108777720A (en) 2018-07-05 2018-07-05 Document transmission method and Related product

Country Status (1)

Country Link
CN (1) CN108777720A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1481127A (en) * 2002-09-04 2004-03-10 英华达(上海)电子有限公司 Method for filtering packets in wireless network system
CN101222509A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Data protection transmission method of P2P network
CN101325582A (en) * 2007-06-15 2008-12-17 华为技术有限公司 Method, system and apparatus for protecting proxy mobile internet protocol signalling
CN101577736A (en) * 2009-06-04 2009-11-11 中兴通讯股份有限公司 Method and device for uploading files
CN101984406A (en) * 2010-11-01 2011-03-09 中兴通讯股份有限公司 Method and system for upgrading terminal through wireless local area network
CN102571790A (en) * 2011-12-31 2012-07-11 上海聚力传媒技术有限公司 Method and device for implementing encrypted transmission of target files
CN102882789A (en) * 2012-09-17 2013-01-16 华为技术有限公司 Data message processing method, system and equipment
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
US8892875B1 (en) * 2011-07-29 2014-11-18 Trend Micro Incorporated Methods and apparatus for controlling access to encrypted computer files
CN105450632A (en) * 2015-11-03 2016-03-30 中国石油天然气集团公司 Adaptive secure communication interface method
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
US20160365981A1 (en) * 2015-06-10 2016-12-15 Arris Enterprises Llc Code signing system with machine to machine interaction
CN106709360A (en) * 2015-11-17 2017-05-24 福州瑞芯微电子股份有限公司 Data transmission and storage method and system
CN106789975A (en) * 2016-12-07 2017-05-31 广东京奥信息科技有限公司 A kind of method of the text encryption transmission with byte stream is preserved
CN106982186A (en) * 2016-01-16 2017-07-25 周念东 A kind of online safe key guard method and system
CN107483196A (en) * 2017-09-08 2017-12-15 中南大学 Data stream encryption system and its implementation based on continuous variable quantum key distribution

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1481127A (en) * 2002-09-04 2004-03-10 英华达(上海)电子有限公司 Method for filtering packets in wireless network system
CN101325582A (en) * 2007-06-15 2008-12-17 华为技术有限公司 Method, system and apparatus for protecting proxy mobile internet protocol signalling
CN101222509A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Data protection transmission method of P2P network
CN101577736A (en) * 2009-06-04 2009-11-11 中兴通讯股份有限公司 Method and device for uploading files
CN101984406A (en) * 2010-11-01 2011-03-09 中兴通讯股份有限公司 Method and system for upgrading terminal through wireless local area network
US8892875B1 (en) * 2011-07-29 2014-11-18 Trend Micro Incorporated Methods and apparatus for controlling access to encrypted computer files
CN102571790A (en) * 2011-12-31 2012-07-11 上海聚力传媒技术有限公司 Method and device for implementing encrypted transmission of target files
CN102882789A (en) * 2012-09-17 2013-01-16 华为技术有限公司 Data message processing method, system and equipment
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
US20160365981A1 (en) * 2015-06-10 2016-12-15 Arris Enterprises Llc Code signing system with machine to machine interaction
CN105450632A (en) * 2015-11-03 2016-03-30 中国石油天然气集团公司 Adaptive secure communication interface method
CN106709360A (en) * 2015-11-17 2017-05-24 福州瑞芯微电子股份有限公司 Data transmission and storage method and system
CN106982186A (en) * 2016-01-16 2017-07-25 周念东 A kind of online safe key guard method and system
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
CN106789975A (en) * 2016-12-07 2017-05-31 广东京奥信息科技有限公司 A kind of method of the text encryption transmission with byte stream is preserved
CN107483196A (en) * 2017-09-08 2017-12-15 中南大学 Data stream encryption system and its implementation based on continuous variable quantum key distribution

Similar Documents

Publication Publication Date Title
CN104821937B (en) Token acquisition methods, apparatus and system
US11379022B2 (en) Mobile terminal
CN107113162B (en) The system and method for multivalue packing scheme for homomorphic cryptography
CN104598263B (en) Application program operation method, configuration file generation method and device
CN104700010A (en) Personal information protection method and protection device
CN106331372B (en) Data transmission method and mobile terminal
CN107103211B (en) SDK send, using publication, using operation method and device
CN106502826B (en) Data backup and transmission method and mobile terminal
CN106850220A (en) Data ciphering method, data decryption method and device
CN105678553A (en) Method, device and system for processing order information
CN110169028A (en) Update method, terminal and the server of network insertion weight discriminating information
CN104700003B (en) A kind of file shell adding and hulling method, apparatus and system
CN104579668A (en) User identity verification method, password protection device and verification system
CN107154935A (en) service request method and device
CN106599698B (en) A kind of method and apparatus for encrypting picture, decrypting picture
CN108307529A (en) A kind of hotspot connection method and its mobile terminal
CN107911818A (en) The method, device and mobile terminal of data transfer between mobile terminal
CN104954126A (en) Sensitive operation verification method, device and system
CN104901991A (en) Methods, devices and system for transferring virtual resource
CN106685948A (en) Data processing method, terminal, communication device and data processing system
CN107592409A (en) Application control method and device
CN109918880A (en) The method, apparatus and terminal device of data encryption or decryption
CN104639394B (en) Statistical method, the device and system of client number of users
CN107995151A (en) Login validation method, apparatus and system
CN106954211B (en) A kind of key wiring method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181109